2022 International Conference on Communication, Computing and Internet of Things (IC3IoT) 2022
DOI: 10.1109/ic3iot53935.2022.9767996
|View full text |Cite
|
Sign up to set email alerts
|

DOA Method with Reduced Bias and Side Lobe Suppression

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
6
3
1

Relationship

0
10

Authors

Journals

citations
Cited by 19 publications
(15 citation statements)
references
References 12 publications
0
15
0
Order By: Relevance
“…The scheme's advantages include the distribution of keys through untrusted channels, the elimination of file storage in central delivery, clarification of key escrow-related concerns, supervision of the keys in chief checking services, and self-protection from malicious files during upload [44]. Additionally, the system ensures that details about the data cannot be accessed by insiders.…”
Section: Resultsmentioning
confidence: 99%
“…The scheme's advantages include the distribution of keys through untrusted channels, the elimination of file storage in central delivery, clarification of key escrow-related concerns, supervision of the keys in chief checking services, and self-protection from malicious files during upload [44]. Additionally, the system ensures that details about the data cannot be accessed by insiders.…”
Section: Resultsmentioning
confidence: 99%
“…The results are estimated and tabulated in Tables 1, 2 and 3 respectively. Figure 8 shows the various methods of end-to-end delay in WSN with respect to the vehicle (node) velocity of 40Km/h [42][43][44][45][46]. Figure 9 shows the comparison analysis of various techniques of PDR with respect to the vehicle velocity 40Km/h and Figure 10 shows the throughput analysis of various techniques with respect to the number of nodes.…”
Section: Geographic Routing Protocol (Grp) -Analysis and Discussionmentioning
confidence: 99%
“…Message passing uses the BP algorithm, and it occurs iteratively between VNs and check nodes. VNs send messages to connected check nodes, and check nodes send messages back to VNs [56][57][58].…”
Section: Check Node Processingmentioning
confidence: 99%